General
-
Target
fbd5230c05fa25148fc296490d4270184bd81c8699dfbd5c1c12bb9e268a2981
-
Size
2.9MB
-
Sample
231016-f11g2sdh68
-
MD5
8ffcfd11eaa80781ee64f3aef8ad7fca
-
SHA1
17b24576ee4f9a91160b80f60c328f5648c7c268
-
SHA256
fbd5230c05fa25148fc296490d4270184bd81c8699dfbd5c1c12bb9e268a2981
-
SHA512
c871cc96176cc8bb171261db3d5ebae5bf847edf137de5d38e4e9e127a28116efada8858eaa343fe5e2f7b0f11a9f76746f0d6430acc6a89404756ceba379505
-
SSDEEP
49152:vVMgl97iBFOHrQ22FciF227AgFmfCorAx1us:aQA5Ea1T
Static task
static1
Malware Config
Extracted
amadey
3.89
http://193.42.32.29/9bDc8sQ/index.php
-
install_dir
1ff8bec27e
-
install_file
nhdues.exe
-
strings_key
2efe1b48925e9abf268903d42284c46b
Extracted
vidar
6
5a1fadccb27cfce506dba962fc85426d
https://steamcommunity.com/profiles/76561199560322242
https://t.me/cahalgo
-
profile_id_v2
5a1fadccb27cfce506dba962fc85426d
-
user_agent
Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0 uacq
Targets
-
-
Target
fbd5230c05fa25148fc296490d4270184bd81c8699dfbd5c1c12bb9e268a2981
-
Size
2.9MB
-
MD5
8ffcfd11eaa80781ee64f3aef8ad7fca
-
SHA1
17b24576ee4f9a91160b80f60c328f5648c7c268
-
SHA256
fbd5230c05fa25148fc296490d4270184bd81c8699dfbd5c1c12bb9e268a2981
-
SHA512
c871cc96176cc8bb171261db3d5ebae5bf847edf137de5d38e4e9e127a28116efada8858eaa343fe5e2f7b0f11a9f76746f0d6430acc6a89404756ceba379505
-
SSDEEP
49152:vVMgl97iBFOHrQ22FciF227AgFmfCorAx1us:aQA5Ea1T
-
Glupteba payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1